Looks like palinux.external.hp.com is a PA-RISC machine running Debian Etch (plus other stuffs of course).

Seems that it is running a 2.[4|6].x linux kernel. At least that is what my nmap scan(1) told me.

Starting Nmap 4.11 ( [link|http://www.insecure.org/nmap/|http://www.insecure.org/nmap/] ) at 2006-10-31 19:45 EST\nDNS resolution of 1 IPs took 0.02s.\nInitiating SYN Stealth Scan against palinux.external.hp.com (192.25.206.14) [1680 ports] at 19:45\nDiscovered open port 53/tcp on 192.25.206.14\nDiscovered open port 80/tcp on 192.25.206.14\nDiscovered open port 25/tcp on 192.25.206.14\nDiscovered open port 22/tcp on 192.25.206.14\nDiscovered open port 21/tcp on 192.25.206.14\nDiscovered open port 113/tcp on 192.25.206.14\nSYN Stealth Scan Timing: About 2.20% done; ETC: 20:07 (0:22:13 remaining)\nDiscovered open port 2401/tcp on 192.25.206.14\nDiscovered open port 873/tcp on 192.25.206.14\nSYN Stealth Scan Timing: About 87.65% done; ETC: 20:11 (0:03:12 remaining)\nThe SYN Stealth Scan took 1551.20s to scan 1680 total ports.\nInitiating service scan against 8 services on palinux.external.hp.com (192.25.206.14) at 20:10\nThe service scan took 30.87s to scan 8 services on 1 host.\nWarning:  OS detection will be MUCH less reliable because we did not find at least 1 open and 1 closed TCP port\nFor OSScan assuming port 21 is open, 41893 is closed, and neither are firewalled\nHost palinux.external.hp.com (192.25.206.14) appears to be up ... good.\nInteresting ports on palinux.external.hp.com (192.25.206.14):\nNot shown: 1672 filtered ports\nPORT     STATE SERVICE    VERSION\n21/tcp   open  ftp        ProFTPD 1.3.0\n22/tcp   open  ssh        OpenSSH 4.3p2 Debian 5 (protocol 2.0)\n25/tcp   open  smtp       Postfix smtpd\n53/tcp   open  domain\n80/tcp   open  http       Apache httpd 1.3.34 (Ben-SSL/1.55 (Debian) PHP/4.4.2-1.1)\n113/tcp  open  ident      OpenBSD identd\n873/tcp  open  rsync       (protocol version 29)\n2401/tcp open  cvspserver cvs pserver\nDevice type: broadband router|general purpose\nRunning: Level One embedded, Linux 2.4.X|2.6.X\nToo many fingerprints match this host to give specific OS details\nTCP/IP fingerprint:\nSInfo(V=4.11%P=i686-pc-linux-gnu%D=10/31%Tm=4547F44B%O=21%C=-1)\nTSeq(Class=RI%gcd=1%SI=1A1D4E%IPID=Z)\nT1(Resp=Y%DF=Y%W=16A0%ACK=S++%Flags=AS%Ops=MNNTNW)\nT2(Resp=N)\nT3(Resp=N)\nT4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)\nT5(Resp=N)\nT6(Resp=N)\nT7(Resp=N)\nPU(Resp=N)\nTCP Sequence Prediction: Class=random positive increments\n                         Difficulty=1711438 (Good luck!)\nIPID Sequence Generation: All zeros\nService Info: Host:  mail.parisc-linux.org; OSs: Unix, Linux, OpenBSD\n\nNmap finished: 1 IP address (1 host up) scanned in 1594.070 seconds\n               Raw packets sent: 11070 (309.952KB) | Rcvd: 300 (13.944KB)



More than likely it is Debian Etch on PA-RISC. I am unsure what the issue maybe. You might wanna send them a kindly note. I am assuming your are using the MAD64 Dapper (AMD64). I still think the rush to 64-bit a good thing overall, but not a good thing for production yet.

People have to many agendas for 64-bit, overlooking many of the things 32-bit has many years of. Like stability and compatibility (not all inclusive).


1 == nmap -sS -sV -O -P0 -T2 -M 1 -f -v 192.25.206.14